• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 107
  • 23
  • 4
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 128
  • 128
  • 128
  • 119
  • 112
  • 36
  • 36
  • 29
  • 21
  • 20
  • 18
  • 18
  • 18
  • 15
  • 14
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
91

Visual intent recognition in a multiple camera environment /

Erhard, Matthew John. January 2006 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2006. / Typescript. Includes bibliographical references (leaves lxxxvii-lxxxix).
92

Facing uncertainty 3D face tracking and learning with generative models /

Marks, Tim K. January 2006 (has links)
Thesis (Ph. D.)--University of California, San Diego, 2006. / Title from first page of PDF file (viewed February 27, 2006). Available via ProQuest Digital Dissertations. Vita. Includes bibliographical references (p. 143-148).
93

Learning real-time object detectors probabilistic generative approaches /

Fasel, Ian Robert. January 2006 (has links)
Thesis (Ph. D.)--University of California, San Diego, 2006. / Title from first page of PDF file (viewed July 24, 2006). Available via ProQuest Digital Dissertations. Vita. Includes bibliographical references (p. 87-91).
94

Feature tracking and pattern registration

Wagener, Dirk Wolfram 11 1900 (has links)
Thesis (MScEng) -- Stellenbosch University, 2003. / ENGLISH ABSTRACT: The video-based computer vision patient positioning system that is being developed at iThemba Laboratories, relies on the accurate, robust location, identification and tracking of a number of markers on the patient's mask. The precision requirements are demanding - a small error in the location of the markers leads to an inaccurate positioning of the patient, which could have fatal consequences. In this thesis we discuss the contsruction of suitable markers, their identification with subpixel accuracy, as well as a robust tracking algorithm. The algorithms were implemented and tested on real data. We also note and give examples of other applications, most notably 2D human face tracking and the 3D tracking of a moving person. / AFRIKAANSE OPSOMMING: Die video-gebaseerde rekenaarvisie pasiënt posisionerings stelsel wat by iThemba Laboratoriums ontwikkel word, maak staat op die akkurate opsporing, identifikasie en volging van 'n stel merkers op die pasiënt se masker. Die akkuraatheids voorwaardes is besonders streng - selfs 'n klein fout in die lokasie vandie merkers sal lei tot die onakkurate posisionering van die pasiënt, wat dodelike gevolge kan hê. In hierdie tesis bespreek ons die konstruksie van geskikte merkers, die identifikasie van die merkers tot op subbeeldingselement vlak en ook die akkurate volging van die merkers. Die algoritmes is op regte data getoets. Ander toepassings soos 2D en 3D menlike gesigs-volging word ook kortliks bespreek.
95

Automated face detection and recognition for a login system

Louw, Lloyd A. B. 03 1900 (has links)
Thesis (MScEng (Mathematical Sciences. Applied Mathematics))--University of Stellenbosch, 2007. / The face is one of the most characteristic parts of the human body and has been used by people for personal identification for centuries. In this thesis an automatic process for frontal face recognition from 2–dimensional images is presented based on principal component analysis. The goal is to use these concepts in eventual face–recognizing login software. The first step is detecting faces in images that are allowed a certain degree of clutter. This is achieved by skin colour detection in the HSV colourspace. This process indicates the area of the image most likely corresponding to the face. Extracting the face is achieved by morphological processing of this area of the image. The face is then normalized by a transformation that uses the eye coordinates as input. Automatic eye detection is implemented based on colour analysis of the facial images and a 91.1% success rate is achieved. Recognition of the normalized faces is achieved using eigenfaces. To calculate these, a large enough database of facial images is needed. The xm2vts database is used in this thesis as the images have very constant lighting conditions throughout – an important factor affecting the accuracy of the recognition stage. Distinction is also made between identification and verification of faces. For identification, up to 80.1% accuracy is achieved, while for verification, the equal error rate is approximately 3.5%.
96

Person re-identification with limited labeled training data

Li, Jiawei 23 May 2018 (has links)
With the growing installation of surveillance video cameras in both private and public areas, it is an immediate requirement to develop intelligent video analysis system for the large-scale camera network. As a prerequisite step of person tracking and person retrieval in intelligent video analysis, person re-identification, which targets in matching person images across camera views is an important topic in computer vision community and has been received increasing attention in the recent years. In the supervised learning methods, the person re-identification task is formulated as a classification problem to extract matched person images/videos (positives) from unmatched person images/videos (negatives). Although the state-of-the-art supervised classification models could achieve encouraging re-identification performance, the assumption that label information is available for all the cameras, is impractical in large-scale camera network. That is because collecting the label information of every training subject from every camera in the large-scale network can be extremely time-consuming and expensive. While the unsupervised learning methods are flexible, their performance is typically weaker than the supervised ones. Though sufficient labels of the training subjects are not available from all the camera views, it is still reasonable to collect sufficient labels from a pair of camera views in the camera network or a few labeled data from each camera pair. Along this direction, we address two scenarios of person re-identification in large-scale camera network in this thesis, i.e. unsupervised domain adaptation and semi-supervised learning and proposed three methods to learn discriminative model using all available label information and domain knowledge in person re-identification. In the unsupervised domain adaptation scenario, we consider data with sufficient labels as the source domain, while data from the camera pair missing label information as the target domain. A novel domain adaptive approach is proposed to estimate the target label information and incorporate the labeled data from source domain with the estimated target label information for discriminative learning. Since the discriminative constraint of Support Vector Machines (SVM) can be relaxed into a necessary condition, which only relies on the mean of positive pairs (positive mean), a suboptimal classification model learning without target positive data can be those using target positive mean. A reliable positive mean estimation is given by using both the labeled data from the source domain and potential positive data selected from the unlabeled data in the target domain. An Adaptive Ranking Support Vector Machines (AdaRSVM) method is also proposed to improve the discriminability of the suboptimal mean based SVM model using source labeled data. Experimental results demonstrate the effectiveness of the proposed method. Different from the AdaRSVM method that using source labeled data, we can also improve the above mean based method by adapting it onto target unlabeled data. In more general situation, we improve a pre-learned classifier by adapting it onto target unlabeled data, where the pre-learned classifier can be domain adaptive or learned from only source labeled data. Since it is difficult to estimate positives from the imbalanced target unlabeled data, we propose to alternatively estimate positive neighbors which refer to data close to any true target positive. An optimization problem for positive neighbor estimation from unlabeled data is derived and solved by aligning the cross-person score distributions together with optimizing for multiple graphs based label propagation. To utilize the positive neighbors to learn discriminative classification model, a reliable multiple region metric learning method is proposed to learn a target adaptive metric using regularized affine hulls of positive neighbors as positive regions. Experimental results demonstrate the effectiveness of the proposed method. In the semi-supervised learning scenario, we propose a discriminative feature learning using all available information from the surveillance videos. To enrich the labeled data from target camera pair, image sequences (videos) of the tagged persons are collected from the surveillance videos by human tracking. To extract the discriminative and adaptable video feature representation, we propose to model the intra-view variations by a video variation dictionary and a video level adaptable feature by multiple sources domain adaptation and an adaptability-discriminability fusion. First, a novel video variation dictionary learning is proposed to model the large intra-view variations and solved as a constrained sparse dictionary learning problem. Second, a frame level adaptable feature is generated by multiple sources domain adaptation using the variation modeling. By mining the discriminative information of the frames from the reconstruction error of the variation dictionary, an adaptability-discriminability (AD) fusion is proposed to generate the video level adaptable feature. Experimental results demonstrate the effectiveness of the proposed method.
97

Biometric system security and privacy: data reconstruction and template protection

Mai, Guangcan 31 August 2018 (has links)
Biometric systems are being increasingly used, from daily entertainment to critical applications such as security access and identity management. It is known that biometric systems should meet the stringent requirement of low error rate. In addition, for critical applications, the security and privacy issues of biometric systems are required to be concerned. Otherwise, severe consequence such as the unauthorized access (security) or the exposure of identity-related information (privacy) can be caused. Therefore, it is imperative to study the vulnerability to potential attacks and identify the corresponding risks. Furthermore, the countermeasures should also be devised and patched on the systems. In this thesis, we study the security and privacy issues in biometric systems. We first make an attempt to reconstruct raw biometric data from biometric templates and demonstrate the security and privacy issues caused by the data reconstruction. Then, we make two attempts to protect biometric templates from being reconstructed and improve the state-of-the-art biometric template protection techniques.
98

Aplicação de sistemas imunológicos artificiais para biometria facial: Reconhecimento de identidade baseado nas características de padrões binários

Silva, Jadiel Caparrós da [UNESP] 15 May 2015 (has links) (PDF)
Made available in DSpace on 2015-09-17T15:26:23Z (GMT). No. of bitstreams: 0 Previous issue date: 2015-05-15. Added 1 bitstream(s) on 2015-09-17T15:45:43Z : No. of bitstreams: 1 000846199.pdf: 4785482 bytes, checksum: d06441c7f33c2c6fc4bfe273884b0d5a (MD5) / O presente trabalho tem como objetivo realizar o reconhecimento de identidade por meio de um método baseado nos Sistemas Imunológicos Artificiais de Seleção Negativa. Para isso, foram explorados os tipos de recursos e alternativas adequadas para a análise de expressões faciais 3D, abordando a técnica de Padrão Binário que tem sido aplicada com sucesso para o problema 2D. Inicialmente, a geometria facial 3D foi convertida em duas representações em 2D, a Depth Map e a APDI, que foram implementadas com uma variedade de tipos de recursos, tais como o Local Phase Quantisers, Gabor Filters e Monogenic Filters, a fim de produzir alguns descritores para então fazer-se a análise de expressões faciais. Posteriormente, aplica-se o Algoritmo de Seleção Negativa onde são realizadas comparações e análises entre as imagens e os detectores previamente criados. Havendo afinidade entre as imagens previamente estabelecidas pelo operador, a imagem é classificada. Esta classificação é chamada de casamento. Por fim, para validar e avaliar o desempenho do método foram realizados testes com imagens diretamente da base de dados e posteriormente com dez descritores desenvolvidos a partir dos padrões binários. Esses tipos de testes foram realizados tendo em vista três objetivos: avaliar quais os melhores descritores e as melhores expressões para se realizar o reconhecimento de identidade e, por fim, validar o desempenho da nova solução de reconhecimento de identidades baseado nos Sistemas Imunológicos Artificiais. Os resultados obtidos pelo método apresentaram eficiência, robustez e precisão no reconhecimento de identidade facial / This work aims to perform the identity recognition by a method based on Artificial Immune Systems, the Negative Selection Algorithm. Thus, the resources and adequate alternatives for analyzing 3D facial expressions were explored, exploring the Binary Pattern technique that is successfully applied for the 2D problem. Firstly, the 3D facial geometry was converted in two 2D representations. The Depth Map and the Azimuthal Projection Distance Image were implemented with other resources such as the Local Phase Quantisers, Gabor Filters and Monogenic Filters to produce descriptors to perform the facial expression analysis. Afterwards, the Negative Selection Algorithm is applied, and comparisons and analysis with the images and the detectors previously created are done. If there is affinity with the images, than the image is classified. This classification is called matching. Finally, to validate and evaluate the performance of the method, tests were realized with images from the database and after with ten descriptors developed from the binary patterns. These tests aim to: evaluate which are the best descriptors and the best expressions to recognize the identities, and to validate the performance of the new solution of identity recognition based on Artificial Immune Systems. The results show efficiency, robustness and precision in recognizing facial identity
99

Bandwidth efficient virtual classroom

Van der Schyff, Marco 27 February 2009 (has links)
M.Ing. / Virtual classrooms and online-learning are growing in popularity, but there are still some factors limiting the potential. Limited bandwidth for audio and video, the resultant transmission quality and limited feedback during virtual classroom sessions are some of the problems that need to be addressed. This thesis presents information on the design and implementation of various components of a virtual classroom system for researching methods of student feedback with a focus on bandwidth conservation. A facial feature technique is implemented and used within the system to determine the viability of using facial feature extraction to provide and prioritise feedback from students to teacher while conserving bandwidth. This allows a teacher to estimate the comprehension level of the class and individual students based on student images. A server determines which student terminal transmits its images to the teacher using data obtained from the facial feature extraction process. Feedback is improved as teachers adapt to class circumstances using experience gained in traditional classrooms. Feedback is also less reliant on intentional student participation. New page-turner, page suggestion and class activity components are presented as possible methods for improving student feedback. In particular, the effect of virtual classroom system parameters on feedback delays and bandwidth usage is investigated. In general, delays are increased as bandwidth requirements decrease. The system shows promise for future use in research on facial feature extraction, student feedback and bandwidth conservation in virtual classrooms.
100

Multimodal verification of identity for a realistic access control application

Denys, Nele 18 November 2008 (has links)
D. Ing. / This thesis describes a real world application in the field of pattern recognition. License plate recognition and face recognition algorithms are combined to implement automated access control at the gates of RAU campus. One image of the license plate and three images of the driver’s face are enough to check if the person driving a particular car into campus is the same as the person driving this car out. The license plate recognition module is based on learning vector quantization and performs well enough to be used in a realistic environment. The face recognition module is based on the Bayes rule and while performing satisfactory, extensive research is still necessary before this system can be implemented in real life. The main reasons for failure of the system were identified as the variable lighting and insufficient landmarks for effective warping.

Page generated in 0.1324 seconds